Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-34152 PoC — Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via Time Parameter

Source
Associated Vulnerability
Title:Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via Time Parameter (CVE-2025-34152)
Description:An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.
Description
Shenzhen Aitemi M300 Wi-Fi Repeater Unauthenticated RCE (CVE-2025-34152)
Readme
# ⚠️ CVE-2025-34152 – Shenzhen Aitemi M300 Wi-Fi Repeater RCE

## 🚨 Overview

Shenzhen Aitemi M300 Wi-Fi Repeater is affected by an **unauthenticated remote code execution (RCE)**.

* No login required
* Does **not** reboot the device
* Can be exploited remotely

---

## 🛠 Vulnerable Versions

| Version | Status                  |
| ------- | ----------------------- |
| 1.0.x   | ❌ Vulnerable            |
| 1.1.x   | ❌ Vulnerable            |
| 1.2.x   | ❌ Vulnerable            |
| 2.0.x   | ⚠️ Check Vendor Updates |

---

## 💡 Remediation

* Update to the latest firmware from vendor
* Restrict management interface access (LAN only)
* Enable firewall rules to block WAN access
* Monitor logs for suspicious requests

---


---

## 🧪 PoC (Lab Use Only)

> ⚠️ Do **not** use on public devices, only in a controlled lab environment.

```bash
go run CVE-2025-34152.go
```

---
## 🔗 References

* [CVE Details](https://www.cvedetails.com/cve/CVE-2025-34152)
* Vendor Advisory: Shenzhen Aitemi official site
* Exploit analysis: Security blogs

File Snapshot

[4.0K] /data/pocs/c40cfc14d0497838f69d4ef9cf5aaff3ccb8fc6b ├── [2.0K] CVE-2025-34152.go ├── [6.9K] LICENSE └── [1.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →